Sciweavers

1818 search results - page 201 / 364
» How users use access control
Sort
View
134
Voted
CHI
1992
ACM
15 years 9 months ago
Interactive Constraint-Based Search and Replace
We describe enhancements to graphical search and replace that allow users to extend the capabilities of a graphical editor. Interactive constraint-based search and replace can sea...
David Kurlander, Steven Feiner
ACSAC
1998
IEEE
15 years 9 months ago
Protecting Web Servers from Security Holes in Server-Side Includes
This paper first investigates and analyzes security holes concerning the use of Server-Side Includes (SSI) in some of the most used Web server software packages. We show that, by ...
Jared Karro, Jie Wang
CSAC
2004
15 years 6 months ago
CoMex - A Mechanism for Coordination of Task Execution in Group Work
CoMex (Coordination Mechanism) is a system to coordinate the execution of tasks accessing coordinable entities. It uses coordination rules to describe the temporal and logical orde...
Hilda Tellioglu
KDD
2012
ACM
212views Data Mining» more  KDD 2012»
13 years 7 months ago
Factoring past exposure in display advertising targeting
Online advertising is increasingly becoming more performance oriented, where the decision to show an advertisement to a user is made based on the user’s propensity to respond to...
Neha Gupta, Abhimanyu Das, Sandeep Pandey, Vijay K...
128
Voted
COMCOM
2007
123views more  COMCOM 2007»
15 years 5 months ago
Seamless transport service selection by deploying a middleware
Despite the many research efforts at the transport layer (SCTP, DCCP, etc.), new innovations in that area hardly ever make it into the TCP/IP stacks of standard end systems. We b...
Sven Hessler, Michael Welzl